A Lower Bound for a Class of Graph Based Loss-resilient Codes Work of Both Authors Has Been Supported by Grant 21-49626.96 from Schweizer Nation- Alfonds (snf)
نویسنده
چکیده
Recently, Luby et al. constructed information-theoretically almost optimal loss-resilient codes. The construction is based on a sequence of bipartite graphs. Using a probabilistic construction for the individual bipartite graphs, they obtain loss-resilient codes that have very eecient encoding and decoding algorithms. They left open the question whether there are other bipartite graphs leading to codes with even more eecient encoding and decoding algorithms. In this paper we show that if one follows the basic construction used by Luby et al., then their choice of bipartite graphs leads to codes with asymptotically optimal encoding and decoding algorithms.
منابع مشابه
Optimization of Sound Transmission Loss of a Composite Rectangular Plate with Infinite Baffle
In this paper, optimization of the sound transmission loss of finite rectangular anisotropic laminated composite plate with simply supported boundary conditions has been developed to maximize transmission loss. Appropriate constraints were imposed to prevent the occurrence of softening effect due to optimization. For this purpose, optimization process was incorporated into comprehensive finite ...
متن کاملA new security proof for FMNV continuous non-malleable encoding scheme
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...
متن کاملA Study on Neodymium Recovery from Aqueous Solutions for Designing a New Generation of Sandwich Liquid Membrane
Liquid Membrane (LM) based processes, as Supported Liquid Membranes (SLMs), have been proposed, for over 30 years, as effective methods for the selective separation of inorganic/organic species from different water streams. The industrial use of SLMs has been limited mainly by their insufcient stability. To investigate on the main cause of system destabilization and the o...
متن کاملVideo-based face recognition in color space by graph-based discriminant analysis
Video-based face recognition has attracted significant attention in many applications such as media technology, network security, human-machine interfaces, and automatic access control system in the past decade. The usual way for face recognition is based upon the grayscale image produced by combining the three color component images. In this work, we consider grayscale image as well as color s...
متن کاملMAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE
Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998